• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Toyota Halts Production Across Japan After Ransomware Attack

You are here: Home / General Cyber Security News / Toyota Halts Production Across Japan After Ransomware Attack
March 1, 2022

The world’s major carmaker has been forced to halt generation at all of its crops in Japan soon after a ransomware attack on a vital supplier, according to experiences.

Toyota claimed it would suspend 28 output strains at 14 factories on Tuesday, with a planned resumption thanks for Wednesday, in accordance to Nikkei.

The cyber-attack hit plastic components provider Kojima Industries and threatened to spill in excess of into Toyota’s IT methods by using its “Kanban” just-in-time production command technique, the report claimed. Toyota cyber-specialists are said to be on-website at Kojima to identify the affect and supply of the attack.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“It is correct that we have been strike by some form of cyber-attack,” an unnamed official “close” to Kojima Industries explained to Nikkei. “We are however confirming the destruction and we are hurrying to answer, with the best priority of resuming Toyota’s generation technique as soon as attainable.”

Also impacted are Toyota subsidiaries Hino Motors and Daihatsu Motor.

The Japanese carmaker sold 10.5 million vehicles in 2021, making it the world’s most significant producer for the 2nd yr operating.

Andy Kays, CEO of Socura, claimed factory IT and OT systems are so exposed by default that it’s “astounding” additional compromises never occur.

“Modern production providers these kinds of as Kojima Industries will have hundreds, if not hundreds, of linked units on web page. Each individual a person is a potential stage of attack and a level of failure. Combined with a factory’s sizeable workforce, its attack surface is substantial,” he argued.

“Old and out-of-date devices are also a difficulty. Even companies at the chopping edge of electronic transformation will commonly have some legacy equipment on the ground. Normally these are devices that are simply just far too previous to be up to date with the latest security patches, but as well highly-priced or significant to be replaced. In critical infrastructure and production, at times units are not able to be updated and restarted for the reason that companies cannot afford to pay for the downtime.”

The production sector was strike by additional ransomware attacks than any other final 12 months, according to a recent report from IBM.


Some sections of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Euro Police Bust Gang Linked to Migrant Smugglers
Next Post: Conti Encrypts Karma Ransom Note in Same Victim Network Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.